In an identification system for electronic commerce, an end terminal transmits a transaction request message containing biometrics data of a user to a communications network, At least one electronic commerce service provider unit is provided which receives the transaction request message via the network and transmits an authentication request message containing the biometrics data to the network. An authentication server having a database for storing registered biometrics data receives the authentication request message and determines whether the received biometrics data has corresponding biometrics data in the database and returns a reply to the ECSP unit via the network indicating that the transaction request message is authenticated if the received biometrics data coincides with one of the registered biometrics data of the database.
|
26. An authentication server comprising:
a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers;
an interface unit for receiving authentication request messages from a plurality of electronic commerce service provider (ECSP) units via a network, each authentication request message containing ciphered biometrics data of a user and a user identifier of said user;
a deciphering unit which deciphers the ciphered biometrics data; and
a processor, wherein for each of the received authentication request messages, the processor compares the deciphered biometrics data to all of the registered biometrics data in said database and detects the user identifier mapped to the biometrics data which coincides with the deciphered biometrics data,
wherein the interface unit returns a reply to the plurality of ECSP units via said network indicating that a user identified by the detected user identifier is authenticated,
wherein each authentication request message corresponds to a transaction request message transmitted to one of the plurality of ECSP units from one of a plurality of user terminals via said network.
25. An authentication server comprising:
a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers;
an interface unit for receiving authentication request messages from a plurality of electronic commerce service provider (ECSP) units via a network, each authentication request message containing ciphered biometrics data of a user and a user identifier of said user;
a deciphering unit which deciphers the ciphered biometrics data; and
a processor, wherein for each of the received authentication request messages, the processor compares the deciphered biometrics data to one of the registered biometrics data which is mapped in said database to the user identifier contained in the received authentication request message,
wherein the interface unit returns a reply to the plurality of ECSP units via said network indicating that the transaction request message is authenticated if the deciphered biometrics data coincides with the said mapped biometrics data,
wherein each authentication request message corresponds to a transaction request message transmitted to one of the plurality of ECSP units from one of a plurality of user terminals via said network.
18. An identification method comprising the steps of:
a) transmitting, from a plurality of end terminals, transaction request messages, containing ciphered biometrics data of a user to a communications network;
b) receiving, at each one of a plurality of electronic commerce service providers, one of the transaction request messages via said network;
c) for each received transaction request message, transmitting, an authentication request message containing said ciphered biometrics data from one of the plurality of electronic commerce service provider units to said network;
d) receiving said authentication request messages via said network at a user authenticator having a database for storing a plurality of registered biometrics data and the ciphered biometrics data contained in the received authentication request messages;
e) for each of the received authentication request messages, determining whether the deciphered biometrics data has corresponding biometrics data in said database; and
f) for each of the received authentication request messages, returning a reply from said user authenticator to said plurality of electronic commerce service provider via said network indicating that said transaction request message is authenticated if the received deciphered biometrics data coincides with one of the registered biometrics data of the database.
10. An identification system comprising:
a plurality of end terminals
a plurality of electronic commerce service provider (ECSP) units, wherein each one of the plurality of ECSP units receives a transaction request message containing ciphered biometrics data of a user and a user identifier of said user transmitted from the plurality of end terminals via a communications network and for each received transaction request message, one of the plurality of ECSP units transmits an authentication request message containing said ciphered biometrics data to said network: and
an authentication server comprising a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers, wherein the authentication server receives the authentication request messages from the plurality of ECSP units via said network, comparing and for each of the received authentication request messages, the authentication server deciphers the ciphered biometrics data and compares the deciphered biometrics data to all of the registered biometrics data in said database, detects the user identifier mapped to the registered biometrics data which coincides with the deciphered biometrics data, and returns a reply to the plurality of ECSP units via said network indicating that a user identified by the detected user identifier is authenticated.
1. An identification system comprising:
a plurality of end terminals,
a plurality of electronic commerce service provider (ECSP) units, wherein each one of the plurality of ECSP units receives a transaction request message containing ciphered biometrics data of a user and a user identifier of said user transmitted from the plurality of end terminals via a communications network and for each received transaction request message, one of the plurality of ECSP units transmits an authentication request message containing said ciphered biometrics data and said user identifier to said network; and
an authentication server comprising a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers, wherein the authentication server receives the authentication request messages from the plurality ECSP units via said network, and for each of the received authentication request messages, the authentication server decipheres the ciphered biometrics data and compares the deciphered biometrics data to one of the registered biometrics data which is mapped in said database to the user identifier contained in the received authentication request message and returns a reply to the plurality of ECSP units via said network indicating that said transaction request message is authenticated if the received biometrics data coincides with said mapped biometrics data.
22. An identification method comprising the steps of:
a) transmitting, from a plurality of end terminals, transaction request messages, each transaction request message containing ciphered biometrics data of a user to a communications network;
b) receiving, at each one of a plurality of electronic commerce service providers, one of said transaction request message via said network;
c) for each of the received transaction request messages, transmitting, an authentication request message containing said ciphered biometrics data from one of the plurality of electronic commerce service providers to said network;
d) receiving, at a user authenticator having a database in which a plurality of registered biometrics data are mapped to a plurality of corresponding registered user identifiers, said authentication request messages via said network and deciphering the ciphered biometrics data contained in the received authentication request messages;
e) for each of the received authentication request messages, comparing the deciphered biometrics data to all of the registered biometrics data in said database to detect coincidence;
f) for each of the received authentication request messages, detecting the user identifier mapped to the biometrics data which coincides with the deciphered biometrics data; and
g) for each of the received authentication request messages, returning a reply from the user authenticator to said plurality of electronic commerce service providers via said network indicating that said user having the detected user identifier is authenticated.
19. An identification method comprising the steps of:
a) transmitting, from a plurality of end terminals, transaction request messages, each transaction request message containing ciphered biometrics data of a user and a user identifier of said user to a communications network;
b) receiving, at each one of a plurality of electronic commerce service providers, one of said transaction request messages via said network;
c) for each of the received transaction request messages, transmitting, an authentication request message containing said ciphered biometrics data and said user identifier from one of the plurality of electronic commerce service provider units to said network;
d) receiving said authentication request messages at a user authenticator via said network, the authenticator having a database in which a plurality of registered biometrics data are mapped to a plurality of corresponding registered user identifiers and deciphering the ciphered biometrics data contained in the received authentication request messages;
e) for each of the received authentication request messages, comparing the deciphered biometrics data to one of the registered biometrics data which is mapped in said database to the user identifier contained in said authentication request message; and
f) for each of the received authentication request messages, returning, from the user authenticator, a reply to said plurality of electronic commerce service providers via said network indicating that said transaction request message is authenticated if the received biometrics data coincides with said mapped biometrics data.
24. An identification system comprising:
a plurality of end terminals,
a plurality of electronic commerce service provider (ECSP) units, wherein each one of the plurality of ECSP units receives a registration request message containing ciphered biometrics data of a user and a user identifier of said user transmitted from the plurality of end terminals via a communications network, retransmits the registration request message to said network, receives a transaction request message containing said ciphered biometrics data transmitted from the plurality of end terminals via said network, and for each received transaction request message, transmits an authentication request message containing said ciphered biometrics data and said user identifier to said network; and
an authentication server for receiving said registration request messages from said plurality of ECSP units via said network, mapping a plurality of biometrics data contained in a plurality of said registration request messages to a plurality of corresponding user identifiers contained in said registration request messages, the authentication server receiving the authentication request messages from the plurality of ECSP units via said network, and for each of the received authentication request messages, the authentication server decipheres the ciphered biometrics data and compares comparing the received and deciphered biometrics data to all of the biometrics data in said database, detects the user identifier mapped to the biometrics data which coincides with the received biometrics data, and r4mmain˜returns a reply to said plurality of ECSP units via said network indicating that a user identified by the detected user identifier is authenticated.
23. An identification system comprising:
a plurality of terminals,
a plurality of electronic commerce service provider (ECSP) units, wherein each one of the plurality of ECSP units receives a registration request message containing ciphered biometrics data of a user and a user identifier of said user transmitted from the plurality of end terminals via a communications network, retransmits the registration request message to said network, receives a transaction request message containing said ciphered biometric data and user identifier transmitted from the plurality of end terminals via said network, and for each received transaction request message, transmits an authentication request message containing said biometrics data and said user identifier to said network; and
an authentication server for receiving said registration request messages from said plurality of ECSP units via said network, mapping in a database a plurality of biometric data contained in a plurality of said registration request messages to a plurality of corresponding user identifiers contain in said registration request messages, the authentication server further receiving the authentication request messages from the plurality of ECSP units via said network, and for each of the received authentication request messages, the authentication server deciphers the ciphered biometrics data and compares, the received deciphered biometrics data to one of the biometrics data which is mapped in said database to the user identifier contained in the received authentication request message and returns a reply to said the plurality of ECSP units via said network indicating that said transaction request message is authenticated if the received biometrics data coincides with said mapped biometrics data.
2. The identification system of
3. The identification system of
4. The identification system of
5. The identification system of
6. The identification system of
7. The identification system of
8. The identification system of
9. The identification system of
11. The identification system of
12. The identification system of
13. The identification system of
14. The identification system of
15. The identification system of
16. The identification system of
17. The identification system of
20. The identification method of
21. The identification method of
|
1. Field of the Invention
The present invention relates generally to electronic commerce over communications networks and more specifically to an identification system and method for identification of end-terminal consumers using their biometric features for authorization of transactions.
2. Description of the Related Art
As electronic commerce expands, transactions over communications networks became a target for fraudulent and criminal conducts which are becoming more organized and more technically adept. In order to combat the illegal attempts, customers' biometrics data such as fingerprints are becoming used as a reliable means for personal identification. Pat. No. 5,613,012, when a customer requests a transaction over a network to an electronic commerce service provider, he sends a biometrics feature such as his fingerprint to the service provider, where it is compared with the registered fingerprint. If they match, the service provider authenticates the transaction and proceeds to provide an electronic commerce service to the customer and enters a settlement process with an associated banking facility. However, if the customer wishes to receive service from more than one electronic commerce service provider, there is a need to register the customer's biometrics data in as many service providers as there are necessary to meet the customer's desire. In addition, if the EC service providers are equipped with a technically low-level system or manned by people who are poorly trained in biometrics data security matters, fraudulent leakage of important personal data will occur at a high rate.
It is therefore a primary object of the present invention to provide a user identification system and method that eliminates the need to make a registration for each electronic commerce service provider.
Another object of the present invention is to provide a user identification system and method that is secure against potential danger of eavesdropping by the electronic commerce service providers.
The stated primary object is attained by the provision of a single authenticator in which biometrics data of consumers are registered in a database and to which a plurality of electronic commerce service providers are connected via a communications network. Consumers send a transaction request messages containing their biometrics data to a desired EC service provider, which requests authorization from the user authenticator. If the transmitted biometrics data has a corresponding biometrics data in the database, the user authenticator responds to the authentication request with a reply indicating authentication of the transaction.
According to a first aspect, the present invention provides an identification system comprising a plurality of end terminals, each of the end terminals transmitting a transaction request message containing biometrics data of a user and a user identifier of the user to a communications network, at least one electronic commerce service provider unit for receiving the transaction request message via the network and transmitting an authentication request message containing the biometrics data and the user identifier to the network, and an authentication server having a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers, the authentication server receiving the authentication request message via the network, comparing the received biometrics data to one of the registered biometrics data which is mapped in the database to the user identifier contained in the authentication request message and returning a reply to the ECSP unit via the network indicating that the transaction request message is authenticated if the received biometrics data coincides with the mapped biometrics data.
According to a second aspect, the present invention provides an identification system comprising a plurality of end terminals respectively identified by user identifiers, each of the end terminal transmitting a transaction request message containing biometrics data of a user to a communications network, at least one electronic commerce service provider unit for receiving the transaction request message via the network and transmitting an authentication request message containing the biometrics data to the network, and an authentication server having a database for mapping a plurality of registered biometrics data to a plurality of corresponding registered user identifiers, the authentication server receiving the authentication request message via the network, comparing the received biometrics data to all of the registered biometrics data in the database, detecting the user identifier mapped to the biometrics data which coincides with the received biometrics data, and returning a reply to the ECSP unit via the network indicating that the user having the detected user identifier is authenticated.
The second object is achieved by having each of the end terminals cipher the biometrics data so that the biometrics data contained in the transaction request message and the authentication request message is the ciphered biometrics data, and having the authentication server decipher the ciphered biometrics data contained in the received authentication request message.
According to a third aspect, the present invention provides an identification method comprising the steps of (a) transmitting, from an end terminal a transaction request message containing biometrics data of a user to a communications network, (b) receiving, at an electronic commerce service provider the transaction request message via the network, (c) transmitting from the electronic commerce service provider, an authentication request message containing the biometrics data to the network, (d) receiving the authentication request message via the network at a user authenticator having a database for storing a plurality of registered biometrics data, (e) determining whether the received biometrics data has corresponding biometrics data in the database, and (f) returning a reply from the user authenticator to the electronic commerce service provider via the network indicating that the transaction request message is authenticated if the received biometrics data coincides with one of the registered biometrics data of the database.
According to a fourth aspect, the present invention provides an identification method comprising the steps of (a) transmitting, from an end terminal, a transaction request message containing biometrics data of a user and a user identifier of the user to a communications network, (b) receiving, at an electronic commerce service provider, the transaction request message via the network, (c) transmitting, from the electronic commerce service provider, an authentication request message containing the biometrics data and the user identifier to the network, (d) receiving the authentication request message at a user authenticator via the network, the authenticator having a database in which a plurality of registered biometrics data are mapped to a plurality of corresponding registered user identifiers, (e) comparing the received biometrics data to one of the registered biometrics data which is mapped in the database to the user identifier contained in the authentication request message, and (f) returning, from the user authenticator, a reply to the electronic commerce service provider via the network indicating that the transaction request message is authenticated if the received biometrics data coincides with the mapped biometrics data.
The present invention will be described in detail further with reference to the following drawings, in which:
Referring now to
Each user terminal 10 includes a fingerprint sensor 11, a fingerprint feature extraction unit 12 and an encryption unit 13. Encryption unit 13 may be implemented with the common key encryption scheme such as DES (Data Encryption Standard) or the public key encryption scheme such as RSA (Rivest, Shamir, Aleman). In the latter case, a public key corresponding to the decryption key of the authentication server is used for encryption.
A user's fingerprint is detected by the sensor 11 and a fingerprint feature such as ridge patterns is extracted by the feature extraction unit 12 and ciphered by the encryption unit 13 using a secret key generated by a cipher-key generator 14. A keypad 15 and a display panel 16 are connected to a processor 17 to which the encryption unit 13 is also connected. Processor 17 operates with the associated units according to a programmed instructions stored in a suitable storage medium 18 and exchanges packets with one of the ECSP unit 30 via a network interface 19. To provide a tamper-proof terminal, the fingerprint sensor 11, the feature extraction unit 12, the decryption unit 13 and the cipher-key generator 14 are all organized in an inseparable unit so that sensitive data is protected from an intruder.
Each of the user terminals 10 may be implemented in a desktop or notebook computer, personal digital assistant (PDA) or any other home appliances of the type provided with communication and data processing functions. Each user is uniquely identified by the system with an assigned user identifier (ID-A).
Each ECSP unit 30 is comprised of an interface 31 connected to the network 20 for receiving packets from the user terminals 10. The received user packets are processed in a processor 32 and forwarded through an interface 33 and via the network 20 to the authentication server 40. Processor 32 is further associated with an ID conversion table 34 in which the user identifiers ID-As from the user terminals 10 are mapped to corresponding user identifiers ID-Bs. The converted user identifiers ID-Bs are used exclusively for data transfer between the ECSP units and the authentication server 40. The use of user identifiers ID-B's different from ID-A's for data transfer between ECSP's and authentication server 40 prevents the latter from accessing the sensitive personal data of the registered users. Further, the use of ciphered user's biometric data for data transfer between the end terminals and the authentication server prevents the ECSP's from eavesdropping the sensitive biometrics data of the registered users.
Authentication server 40 is comprised of an interface 41 connected to the network 20 to exchange packets. Packets from the network 20 are processed in a processor 42 according to programmed instructions stored in a storage medium 46. The ciphered biometric data contained in a received packet is deciphered by a decryption unit 43 using a secret key supplied from a decipher-key generator 44. The deciphered biometric data (fingerprint features) and corresponding user identifiers (ID-Bs) are mapped in a user identification table 45.
The operation of processor 17 at the user terminal 10 proceeds according to the flowchart of
At the start of the programmed routine, the processor 17 sets a registration flag R to 0 at step 201 and proceeds to step 202 to monitor the output of the encryption unit 13 to check to see if the user ID-A and ciphered biometrics data (fingerprint feature) are obtained. If so, the processor 17 checks the flag R to see if the user is already registered or not (step 203). If R=0, the processor determines that the user is not yet registered in the authentication server and proceeds to step 204 to transmit a registration request packet to a desired ECSP unit 30 through the network 20, containing the user ID-A and the ciphered biometrics data (see also
When the user subsequently enters his user identifier ID-A and fingerprint, the processor determines, at step 203, that the user has been registered and proceeds to decision step 210 to check for the entry of sales/service item of electronic commerce through the keypad 15. If such an item has been entered by the user, the processor formulates a transaction request packet with the user ID-A, the ciphered biometrics data and the sales/service item and transmits the packet to the desired ECSP unit via the network 20. If the user is authenticated, the ECSP unit is notified accordingly from the authentication server 40 and the user receives appropriate service from the ECSP (step 212), and the processor returns to step 202.
In
When the ECSP unit 30 receives a transaction request packet (step 303), the processor 32 reads a user ID-B from the conversion table 34 that corresponds to the user ID-A contained in the transaction request packet (step 304) and transmits an authentication request packet to the authentication server 40, containing the ID-B and ciphered biometrics data of the requesting user (step 305). When the processor 32 receives a reply packet at step 306 from the SAU 40, the ECSP provides service of electronic commerce to the requesting user if the reply packet indicates that the user is identified as an authorized user.
In
The identification system according to a second embodiment of the present invention is shown in
In the second embodiment, the user terminals 10 A differ from the user terminals of the previous embodiment in that the encryption unit 13A receives an encryption key from the processor 17A that is transmitted from the authentication server 40A for a data transfer during both registration and transaction modes. This increases the security of the secret key from illegal deciphering attempts. ECSP units 30A are not provided with the conversion table of the previous embodiment. Due to the enhanced security of the encryption/decryption key which varies with time, the user identifiers input at the user terminals are directly used for data transfer through the network 20. For this purpose, the authentication server 40A includes a secret key generator 44A which generates a different secret key at different times and supplies it to the processor 42A and the decryption unit 43A. User identification table 45A stores user identifiers ID instead of the converted user identifiers of the previous embodiment.
The system of
In the first mode of operation, the processor 17A at the user terminal 10A proceeds according to the flowchart of
At the start of the programmed routine, the processor 17A sets a registration flag R to 0 at step 701 and proceeds to step 702 to monitor the keypad 15A to determine if the user ID is entered. If so, the processor 17A sends a key request packet to a desired ECSP unit 30A (see also
When the user subsequently enters his ID for a transaction, the processor 17A requests an encryption key from the network to produce a ciphered fingerprint feature and determines, at step 707, that the user's ID has already been registered. As a result, the processor 17A proceeds from step 707 to step 711 to check to see if sales/service item of electronic commerce is entered through the keypad 15A. If such an item has been entered, the processor 17A formulates a transaction request packet with the user ID, the ciphered biometrics data and the sales/service item and transmits the packet to the desired ECSP unit In response to the transaction request packet, the ECSP unit formulates and transmits an authentication request packet to the authentication server 40A. If the user is authenticated, the ECSP unit is notified accordingly from the SAU 40A and the user receives appropriate service from the ECSP (step 713), and the processor return to step 702.
In the first mode of operation, the processor 42A at the authentication server 40A proceeds according to the flowchart of
When a key request packet is received from the ECSP unit 30A (step 801), the processor 42A transmits an encryption key currently produced by the secret key generator 44A to the ECSP unit, where it is passed on to the requesting user terminal 10A. At step 803, the processor 42A receives a registration request packet containing the ID and ciphered biometrics data of the user and proceeds to step 804 to cause the decryption unit 43A to decipher the received biometrics data and maps the user ID and the deciphered biometrics data in the user identification table 45A. At step 805, the processor 42A sends an acknowledgment packet to the requesting ECSP unit.
If the decision at step 803 is negative, flow proceeds to step 810 to check for the reception of an authentication request packet from the ECSP unit. If an authentication request packet containing the ID and ciphered biometrics data of the user is received, the processor 42A proceeds from step 810 to step 811 to read stored biometrics data from the user identification table 45A corresponding to he received user ID and compares the biometrics data contained in the packet with the biometrics data read from the user identification table 45A to detect a match (step 812). At step 813, a reply packet is sent from the processor 42A to the ECSP unit for indicating the result of the comparison.
In the second mode of operation, the processor 17A at the user terminal 10A proceeds according to the flowchart of
After the user's ID has been registered in the system, the processor 42A checks to see if a key specified for requesting a secret key is operated before a transaction begins (step 1000). If so, flow returns to step 703 to transmit a key request packet to the desired ECSP unit 30A for ciphering the user's biometrics data. When the decision at step 707 subsequently yields a negative answer, flow proceeds to step 711 to check for the entry of a sales/service item. After a sales/service item is entered, the processor 17A sends a transaction request packet to the ECSP unit, containing the ciphered biometrics data and sales/service item of the user (step 1001). In response, the ECSP unit sends an authentication request packet to the SAU 40A, containing the ciphered biometrics data of the user and waits for a reply packet. It is seen that in the second mode of operation of
In the second mode of operation, the processor 42A at the authentication server 40A proceeds according to the flowchart of
When an authentication request packet is received from the ECSP unit 30A (step 810), the processor 42A causes the decryption unit 43A to decipher the ciphered biometrics data contained in the packet and compares the deciphered biometrics data with all the biometrics data stored in the user identification table 45A for a match (step 1100). If biometrics data corresponding to the received biometrics data is found in the user identification table 45 (step 1101), the processor 42A reads a user ID from the table 45 that corresponds to the matched biometrics data (step 1102). At step 1103, the processor 42A transmits a reply packet to the requesting ECSP unit 30A to indicate that the user terminal identified by the corresponding ID is authenticated. In response to this reply packet, the ECSP proceeds to provide requested electronic commerce service to the identified user terminal.
If no match is detected at step 1101, flow proceeds to step 1104 to send a reply packet indicating that the requesting user is not authenticated and the ECSP unit replies the requesting user with a service denial message.
In a hardware aspect, the identification system of
Patent | Priority | Assignee | Title |
10327202, | Jun 09 2006 | Trapeze Networks, Inc. | AP-local dynamic switching |
10638304, | Jun 09 2006 | Trapeze Networks, Inc. | Sharing data between wireless switches system and method |
10798650, | Jun 09 2006 | Trapeze Networks, Inc. | AP-local dynamic switching |
10834585, | Jun 09 2006 | Trapeze Networks, Inc. | Untethered access point mesh system and method |
11222298, | May 28 2010 | User-controlled digital environment across devices, places, and times with continuous, variable digital boundaries | |
11432147, | Jun 09 2006 | Juniper Networks, Inc | Untethered access point mesh system and method |
11627461, | Jun 09 2006 | Juniper Networks, Inc | AP-local dynamic switching |
11758398, | Jun 09 2006 | Juniper Networks, Inc | Untethered access point mesh system and method |
7404081, | Aug 30 2002 | Fujitsu Limited | Electronic storage apparatus, authentication apparatus and authentication method |
7581221, | Oct 17 2001 | Microsoft Technology Licensing, LLC | Systems and methods for sending coordinated notifications |
7620819, | Oct 04 2004 | The Penn State Research Foundation | System and method for classifying regions of keystroke density with a neural network |
7706574, | Nov 06 2003 | CONCENTRIX SREV, INC | Identifying and protecting composed and transmitted messages utilizing keystroke dynamics |
7725717, | Aug 31 2005 | MOTOROLA SOLUTIONS, INC | Method and apparatus for user authentication |
7779114, | Apr 17 2003 | International Business Machines Corporation | Method and system for administering devices with multiple user metric spaces |
7870027, | Jul 10 2002 | FINTEGRAPH, LLC | System for notifying a user when a limit is approaching |
7929951, | Dec 20 2001 | Systems and methods for storage of user information and for verifying user identity | |
8020005, | Dec 23 2005 | CONCENTRIX SREV, INC | Method and apparatus for multi-model hybrid comparison system |
8083137, | Jul 09 2002 | FINTEGRAPH, LLC | Administration of financial accounts |
8112499, | Apr 17 2003 | International Business Machines Corporation | Administering devices in dependence upon user metric vectors |
8112509, | Jul 02 2003 | CARRUM TECHNOLOGIES, LLC | Administering devices with domain state objects |
8116275, | Oct 13 2005 | TRAPEZE NETWORKS, INC | System and network for wireless network monitoring |
8126481, | Nov 21 2007 | Trapeze Networks, Inc. | Wireless station location detection |
8145743, | Apr 17 2003 | International Business Machines Corporation | Administering devices in dependence upon user metric vectors |
8150357, | Mar 28 2008 | TRAPEZE NETWORKS, INC | Smoothing filter for irregular update intervals |
8161278, | Mar 15 2005 | TRAPEZE NETWORKS, INC | System and method for distributing keys in a wireless network |
8180885, | Apr 17 2003 | International Business Machines Corporation | Method and system for administering devices with multiple user metric spaces |
8218449, | Oct 13 2005 | TRAPEZE NETWORKS, INC | System and method for remote monitoring in a wireless network |
8238298, | Aug 29 2008 | TRAPEZE NETWORKS, INC | Picking an optimal channel for an access point in a wireless network |
8238942, | Nov 21 2007 | TRAPEZE NETWORKS, INC | Wireless station location detection |
8261070, | Apr 23 2004 | The Boeing Company | Authentication of untrusted gateway without disclosure of private information |
8332932, | Dec 07 2007 | CONCENTRIX SREV, INC | Keystroke dynamics authentication techniques |
8340110, | Sep 15 2006 | TRAPEZE NETWORKS, INC | Quality of service provisioning for wireless networks |
8392721, | Dec 02 2003 | SURESHWARA INCORPORATED | Method and system to electronically identify and verify an individual presenting himself for such identification and verification |
8457031, | Oct 13 2005 | TRAPEZE NETWORKS, INC | System and method for reliable multicast |
8514827, | Oct 13 2005 | Trapeze Networks, Inc. | System and network for wireless network monitoring |
8635444, | Mar 15 2005 | Trapeze Networks, Inc. | System and method for distributing keys in a wireless network |
8638762, | Feb 08 2006 | TRAPEZE NETWORKS, INC | System and method for network integrity |
8670383, | Dec 28 2006 | Trapeze Networks, Inc. | System and method for aggregation and queuing in a wireless network |
8688818, | Jul 02 2003 | CARRUM TECHNOLOGIES, LLC | Administering devices with domain state objects |
8818322, | Jun 09 2006 | Juniper Networks, Inc | Untethered access point mesh system and method |
8902904, | Sep 07 2007 | TRAPEZE NETWORKS, INC | Network assignment based on priority |
8964747, | May 03 2006 | TRAPEZE NETWORKS, INC | System and method for restricting network access using forwarding databases |
8966018, | May 19 2006 | TRAPEZE NETWORKS, INC | Automated network device configuration and network deployment |
8978105, | Jul 25 2008 | TRAPEZE NETWORKS, INC | Affirming network relationships and resource access via related networks |
9183560, | May 28 2010 | Reality alternate | |
9191799, | Jun 09 2006 | TRAPEZE NETWORKS, INC | Sharing data between wireless switches system and method |
9258702, | Jun 09 2006 | Juniper Networks, Inc | AP-local dynamic switching |
9509682, | Jan 10 2014 | THE BOARD OF REGENTS OF THE NEVADA SYSTEM OF HIGHER EDUCATION ON BEHALF OF THE UNIVERSITY OF NEVADA, LAS VEGAS | Obscuring usernames during a login process |
9646304, | Sep 21 2001 | JPMORGAN CHASE BANK, N.A. | System for providing cardless payment |
9838942, | Jun 09 2006 | Trapeze Networks, Inc. | AP-local dynamic switching |
Patent | Priority | Assignee | Title |
5613012, | Nov 28 1994 | Open Invention Network, LLC | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
6202151, | May 09 1997 | Verizon Patent and Licensing Inc | System and method for authenticating electronic transactions using biometric certificates |
6320974, | Sep 25 1997 | HANGER SOLUTIONS, LLC | Stand-alone biometric identification system |
6332193, | Jan 18 1999 | Sensar, Inc.; SENSAR, INC | Method and apparatus for securely transmitting and authenticating biometric data over a network |
6697947, | Jun 17 1999 | GOOGLE LLC | Biometric based multi-party authentication |
JP10117173, | |||
JP11338947, | |||
JP11339045, | |||
JP1173569, | |||
JP1196363, | |||
JP1198252, | |||
JP200092046, | |||
JP2002501700, | |||
JP5347617, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 15 2001 | NEC Corporation | (assignment on the face of the patent) | / | |||
May 15 2001 | UCHIDA, KAORU | NEC Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011995 | /0823 |
Date | Maintenance Fee Events |
Jan 08 2008 | ASPN: Payor Number Assigned. |
Dec 16 2010 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Dec 24 2014 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 03 2019 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jul 17 2010 | 4 years fee payment window open |
Jan 17 2011 | 6 months grace period start (w surcharge) |
Jul 17 2011 | patent expiry (for year 4) |
Jul 17 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jul 17 2014 | 8 years fee payment window open |
Jan 17 2015 | 6 months grace period start (w surcharge) |
Jul 17 2015 | patent expiry (for year 8) |
Jul 17 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jul 17 2018 | 12 years fee payment window open |
Jan 17 2019 | 6 months grace period start (w surcharge) |
Jul 17 2019 | patent expiry (for year 12) |
Jul 17 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |